> There are two uses for a protocol similar to DKIM/ADSP. > > #1: it can be used as one of many general mailbox decluttering weapons, > reducing the amount of "bad mail" of various sorts that the end recipient > has to sort through with his own eyes. > > #2: it can be used to stop phishes from being successful, by preventing > gullible users from even seeing them.
I fear the wishful thinking problem has arisen here. DKIM simply allows someone in the mail path to attach a domain identity to a message. It doesn't reduce "bad mail", or does it stop phishes. As I noted before it's only useful insofar as you can use the signing domain identity to sort the messages. In the near term, its most likely utility is to whitelist mail from signers you trust, either ones you know directly, or ones published by a credible third party via VBR. > The immediate responses I'm getting in this thread suggest the intended > mission of DKIM is #1. Nope. Regards, John Levine, [email protected], Primary Perpetrator of "The Internet for Dummies", Please consider the environment before reading this e-mail. http://jl.ly _______________________________________________ NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html
